IIW Book! Come get a REAL IIW attendance verification credential and prove it to your IIW friends using your phone!

From IIW

IIW Book

Tuesday 2A

Convener: John Jordon

Notes-taker(s): Jim Wowchuk & John Jordon

Tags for the session - technology discussed/ideas considered:

VON, Agent Demos

Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:

1. Notes provided by Jim Wowchuck:

Key understanding: a demonstration of an identity authentication, issuing, relying party connection and document/chat exchange using authenticated identities.

Steps were described and followed as per slide 1 (photo attached).

Most of the session was walking through participants through the process and providing ids for delegates.

Discussion followed on about the increasing integration between different agent providers using a set of criteria as discussed on slide 2 (photo attached).

There was continued discussion about a Connectathon last February where 6 different systems were verified as connecting. Evernym was not a system that passed, but this was not held as a lack of ability as much as direction of activities – they had more important features they were working on.

Acceptance that even with non-connecting apps, all family protocols have many of the features but with slightly different protocols.

John Jordon speaking:

IIW28 TU 2A IIWBook(3).jpg

IIW28 TU 2A IIWBook(1).jpg

IIW28 TU 2A IIWBook(2).jpg

2. Link to presentation provided by John Jordon: